全文获取类型
收费全文 | 724篇 |
免费 | 96篇 |
国内免费 | 55篇 |
专业分类
电工技术 | 117篇 |
综合类 | 146篇 |
化学工业 | 7篇 |
机械仪表 | 9篇 |
建筑科学 | 48篇 |
矿业工程 | 2篇 |
能源动力 | 6篇 |
轻工业 | 17篇 |
石油天然气 | 1篇 |
武器工业 | 3篇 |
无线电 | 77篇 |
一般工业技术 | 26篇 |
冶金工业 | 49篇 |
原子能技术 | 2篇 |
自动化技术 | 365篇 |
出版年
2024年 | 8篇 |
2023年 | 34篇 |
2022年 | 48篇 |
2021年 | 74篇 |
2020年 | 61篇 |
2019年 | 61篇 |
2018年 | 23篇 |
2017年 | 31篇 |
2016年 | 35篇 |
2015年 | 29篇 |
2014年 | 57篇 |
2013年 | 52篇 |
2012年 | 37篇 |
2011年 | 59篇 |
2010年 | 33篇 |
2009年 | 17篇 |
2008年 | 28篇 |
2007年 | 34篇 |
2006年 | 31篇 |
2005年 | 27篇 |
2004年 | 23篇 |
2003年 | 18篇 |
2002年 | 5篇 |
2001年 | 13篇 |
2000年 | 4篇 |
1999年 | 8篇 |
1998年 | 3篇 |
1995年 | 3篇 |
1992年 | 1篇 |
1988年 | 1篇 |
1987年 | 4篇 |
1986年 | 1篇 |
1985年 | 2篇 |
1984年 | 1篇 |
1983年 | 2篇 |
1982年 | 4篇 |
1971年 | 1篇 |
1963年 | 1篇 |
1962年 | 1篇 |
排序方式: 共有875条查询结果,搜索用时 0 毫秒
771.
随着能源互联网中信息物理系统复杂融合、智能设备大量接入、能量信息频繁交互,使得对数据资产的恶意攻击将无法避免.针对传统的数据风险研究已无法满足能源互联网下的数据生存需求,文章从能源互联网数据安全出发,提出基于网络攻击下能源互联网的数据容侵评估研究.首先分析能源互联网架构组成及业务场景,然后提出基于智能算法的数据安全风险... 相似文献
772.
张东芬 《河南纺织高等专科学校学报》1999,(3):9-12
金融犯罪是当前我国经济犯罪中危害性最严重的一种犯罪,然而我国的司法机关对其打击不力。笔者从五个方面探讨了金融犯罪产生的原因,继而提出了防范措施。 相似文献
773.
774.
775.
In order to prevent attacker traffic classification attacks,a method for generating deception traffic based on adversarial samples from the perspective of the defender was proposed.By adding perturbation to the normal network traffic,an adversarial sample of deception traffic was formed,so that an attacker could make a misclassification when implementing a traffic analysis attack based on a deep learning model,achieving deception effect by causing the attacker to consume time and energy.Several different methods for crafting perturbation were used to generate adversarial samples of deception traffic,and the LeNet-5 deep convolutional neural network was selected as a traffic classification model for attackers to deceive.The effectiveness of the proposed method is verified by experiments,which provides a new method for network traffic obfuscation and deception. 相似文献
776.
777.
The legal system relies heavily on human memory. Crime investigations, criminal trials, and many civil trials depend on memory to reconstruct critical events from the past. Over the last 20 years or so, psychologists have developed a specific research literature on witness testimony. This research has been directed primarily at eyewitnesses, such as victims or bystanders to a criminal event. This issue of Psychology, Public Policy, and Law is devoted to the potential contributions of the scientific study of witness testimony to public policy and legal issues. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
778.
779.
B. J. Bushman, M. C. Wang, and C. A. Anderson (2005) argued that a reanalysis of E. G. Cohn and J. Rotton's (1997) Minneapolis data shows no inverted-U curvilinear relationship between temperature and aggression. Although B. J. Bushman et al.'s (2005) claim of no general inverted-U trend in the data might well be supported statistically, more careful examination of the subset of the data most likely to include the hottest temperatures in the study may offer at least some support for the inverted-U relationship. Aggregating data to describe a general trend minimizes the influence of outliers that may reflect alternative relationships, and such alternatives may be important practically and theoretically. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
780.
Charles Cresson Wood 《Computers & Security》1982,1(2):139-145
A great deal of recent discussion about computer abuse centers on the technical aspects of controls. Nevertheless, to a large extent, computer abuse can be reduced with nontechnical management policies. The use of policies is a low-cost first line of defense to deter rather than prevent, detect, or recovery from these acts. This piece concentrates on effective deterrents to intentional acts, as opposed to errors and omissions. 相似文献